911 resultados para Security Studies


Relevância:

30.00% 30.00%

Publicador:

Resumo:

While many studies have demonstrated the sensitivities of plants and of crop yield to a changing climate, a major challenge for the agricultural research community is to relate these findings to the broader societal concern with food security. This paper reviews the direct effects of climate on both crop growth and yield and on plant pests and pathogens and the interactions that may occur between crops, pests, and pathogens under changed climate. Finally, we consider the contribution that better understanding of the roles of pests and pathogens in crop production systems might make to enhanced food security. Evidence for the measured climate change on crops and their associated pests and pathogens is starting to be documented. Globally atmospheric [CO(2)] has increased, and in northern latitudes mean temperature at many locations has increased by about 1.0-1.4 degrees C with accompanying changes in pest and pathogen incidence and to farming practices. Many pests and pathogens exhibit considerable capacity for generating, recombining, and selecting fit combinations of variants in key pathogenicity, fitness, and aggressiveness traits that there is little doubt that any new opportunities resulting from climate change will be exploited by them. However, the interactions between crops and pests and pathogens are complex and poorly understood in the context of climate change. More mechanistic inclusion of pests and pathogen effects in crop models would lead to more realistic predictions of crop production on a regional scale and thereby assist in the development of more robust regional food security policies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Existing research on the legitimacy of the UN Security Council is conceptual or theoretical, for the most part, as scholars tend to make legitimacy assessments with reference to objective standards. Whether UN member states perceive the Security Council as legitimate or illegitimate has yet to be investigated systematically; nor do we know whether states care primarily about the Council's compliance with its legal mandate, its procedures, or its effectiveness. To address this gap, our article analyzes evaluative statements made by states in UN General Assembly debates on the Security Council, for the period 1991–2009. In making such statements, states confer legitimacy on the Council or withhold legitimacy from it. We conclude the following: First, the Security Council suffers from a legitimacy deficit because negative evaluations of the Council by UN member states far outweigh positive ones. Nevertheless, the Council does not find itself in an intractable legitimacy crisis because it still enjoys a rudimentary degree of legitimacy. Second, the Council's legitimacy deficit results primarily from states' concerns regarding the body's procedural shortcomings. Misgivings as regards shortcomings in performance rank second. Whether or not the Council complies with its legal mandate has failed to attract much attention at all.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The narrative of the United States is of a "nation of immigrants" in which the language shift patterns of earlier ethnolinguistic groups have tended towards linguistic assimilation through English. In recent years, however, changes in the demographic landscape and language maintenance by non-English speaking immigrants, particularly Hispanics, have been perceived as threats and have led to calls for an official English language policy.This thesis aims to contribute to the study of language policy making from a societal security perspective as expressed in attitudes regarding language and identity originating in the daily interaction between language groups. The focus is on the role of language and American identity in relation to immigration. The study takes an interdisciplinary approach combining language policy studies, security theory, and critical discourse analysis. The material consists of articles collected from four newspapers, namely USA Today, The New York Times, Los Angeles Times, and San Francisco Chronicle between April 2006 and December 2007.Two discourse types are evident from the analysis namely Loyalty and Efficiency. The former is mainly marked by concerns of national identity and contains speech acts of security related to language shift, choice and English for unity. Immigrants are represented as dehumanised, and harmful. Immigration is given as sovereignty-related, racial, and as war. The discourse type of Efficiency is mainly instrumental and contains speech acts of security related to cost, provision of services, health and safety, and social mobility. Immigrants are further represented as a labour resource. These discourse types reflect how the construction of the linguistic 'we' is expected to be maintained. Loyalty is triggered by arguments that the collective identity is threatened and is itself used in reproducing the collective 'we' through hegemonic expressions of monolingualism in the public space and semi-public space. The denigration of immigrants is used as a tool for enhancing societal security through solidarity and as a possible justification for the denial of minority rights. Also, although language acquisition patterns still follow the historical trend of language shift, factors indicating cultural separateness such as the appearance of speech communities or the use of minority languages in the public space and semi-public space have led to manifestations of intolerance. Examples of discrimination and prejudice towards minority groups indicate that the perception of worth of a shared language differs from the actual worth of dominant language acquisition for integration purposes. The study further indicates that the efficient working of the free market by using minority languages to sell services or buy labour is perceived as conflicting with nation-building notions since it may create separately functioning sub-communities with a new cultural capital recognised as legitimate competence. The discourse types mainly represent securitising moves constructing existential threats. The perception of threat and ideas of national belonging are primarily based on a zero-sum notion favouring monolingualism. Further, the identity of the immigrant individual is seen as dynamic and adaptable to assimilationist measures whereas the identity of the state and its members are perceived as static. Also, the study shows that debates concerning language status are linked to extra-linguistic matters. To conclude, policy makers in the US need to consider the relationship between four factors, namely societal security based on collective identity, individual/human security, human rights, and a changing linguistic demography, for proposed language intervention measures to be successful.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Researchers investigating the decline of potential applicants for principalships have demonstrated that teachers perceive there to be a significant problem in current selection procedures. This article reports an investigation in two Australian states into principal selection. Drawing on a corpus of interviews, two case studies and administrative guidelines, we highlight five key problems in the interview process: (1) the dependence of selection panels on a written application; (2) the dilemma of experience versus potential; (3) the covert rule about the appointment of preferred applicants; (4) the quandary of panel competency; and (5) the evidence of inconsistency of decisions. We argue that the selection process amounts to a reproductive technology which, in the quest for certainty and safety, results in particular kinds of people being successful. This amounts we suggest, whether the selection process is managed by progressive or conservative personnel, to a form of homosociability the tendency to select people just like oneself.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite recent advances in the area of humanitarian responses and the publication and dissemination of various guidelines with regard to nutritional interventions, there is, however a paucity of studies which have examined the human right to food in complex emergencies. 186 countries including those affected by both human made and natural disasters and countries who are donors of humanitarian relief aid adopted the Rome Declaration on Food Security and World Summit plan of Action reaffirming “ the right to adequate food and the fundamental right of everyone to be free from hunger”. The human right to adequate and nutritious food in refugee settings implies that every refugee has physical and economic access to sufficient food to provide the necessary nutrients for effective physical and physiological functions and achieve well being. There are many grounds for believing that the current humanitarian responses to disasters more often violate than respect the human right to adequate and nutritious food. Using elements of household food security as our working framework this paper focuses on the complex ethical and moral questions raised by the conventional humanitarian assistance framework and in particular the issue of human right to food and household food security in refugee settings.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper addresses the role of security in the collaborative e-learning environment, and in particular, the social aspects of security and the importance of identity. It represents a case study, completed in Nov 2004, which was conducted to test the sense of security that students experienced whilst using the wiki platform as a means of online collaboration in the tertiary education environment. Wikis, fully editable Web sites, are easily accessible, require no software and allow its contributors (in this case students) to feel a sense of responsibility and ownership. A comparison between two wiki studies will be made whereby one group employed user login and the other maintained anonymity throughout the course of the study. The results consider the democratic participation and evolution of the work requirements over time, which in fact ascertains the nonvalidity of administrative identification.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The findings of three case studies resulting from the application of the Australian Small to Medium Enterprise E-business Security Methodology (ASME-EBSM) to each of the SME sectors comprising micro, small and medium businesses are examined. First a comparison of the findings relating to the SME sectors is discussed. The similarities and differences including the challenges experienced by the three sectors concerning the application of e-business security management within their respective e-business operational environments are presented. Second the process of applying the ASME-EBSM is reviewed with reflections upon the development and constituents of the methodology. The paper describes how a number of case studies were undertaken to validate the ASME-EBSM approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

By having an effective organisational information security culture where employees intuitively protect corporate information assets, small and medium size enterprises (SMEs) could improve information security. However, previous research has largely overlooked the development of such a culture for SMEs, and the national context in which SMEs operate. The paper explores this topic and provides key findings from an interpretive Australian study based on a literature review, two focus groups and three case studies. A holistic framework is provided for fostering an information security culture in SMEs in a national setting. The paper discusses key managerial challenges for SMEs attempting to develop such a culture. The main findings suggest that Australian SME owners do not provide sufficient support for information security due to insufficient awareness of its importance and may also be affected by national attitudes to risk. The paper concludes that Australian SME owners may benefit from adopting a risk-based approach to information security and should be educated about the potential strategic role of information technology and information security. The paper also identifies the value and difficulty of promoting a behavioural and learning approach to information security to complement traditional technological and managerial approaches. Implications for theory and practice are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Summary: "In the wake of the September 11 and subsequent terrorist attacks, the academic and media commentaries on Islam the religion and Islam the basis for political ideology haves received an unprecedented high level of exposure and attention. The acts of political violence by extremist groups and the omnipresent war on terror have added fresh uncertainties to an already complex global order. Just as terrorism and counter-terrorism are locked in a mutually re-enforcing symbiosis, the sense of insecurity felt by Muslims and non-Muslims alike is mutually dependent and has the potential to escalate. This general assessment holds true for Muslims living in the Muslim world and beyond. The pervasive sense of being under attack physically and culturally by the United States and its allies has contributed to a growing unease among Muslims and re-enforced deep-seated mistrust of the ʻWestʼ. Public articulation of such misgivings has in turn, lent credence to Western observers who posit an inherent antipathy between the West and the Muslim world. The subsequent policies that have emerged in this context of fear and mutual distrust have contributed to the vicious cycle of insecurity. The present volume is anchored in the current debates on the uneasy and potentially mutually destructive relationship between the Muslim world and certain West countries. It brings together leading international scholars in this interdisciplinary field to deal with such inter-related questions as the nature of Islamism, the impact of the ʻwar on terrorʼ on the spread of militancy, the growing sense of being under siege by Muslim Diasporas and the many unintended ramifications of a security-minded world order. This volume deliberately focuses on these issues both at a broad theoretical level but more importantly in the form of a number of prominent case studies including Indonesia, Algeria and Turkey."--Publisher description.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The article examines Indonesia's capacity to deal with the contemporary Aceh conflict from a policy perspective. The author examines the impact of regime change on state capacity and democratization on center-periphery relations. She also evaluates the post-New Order regime's different security policies in Aceh, how and why they have failed and what this has meant for Indonesia's reform process.